1. [20p] Assuming two computer users: Alice and Ben want to communicate securely using the Private Key Encryption System. Provide a detail explanation with all the steps required in the Private Key encryption system. You must draw an original diagram showing Alice’s and Ben’s communication to support your explanation. (Do not copy diagrams from any resources. Rely on the diagrams discussed in class.)
2. [20p] Same like problem 1 but this time Alice and Ben are using the Public Key Encryption System. Provide a detail explanation with all the steps required and an original diagram. (Do not copy diagrams from any resources. Rely on the diagrams discussed in class.)
3. [15p] Convert the following numbers from decimal to hexadecimal. To obtain credit for the answer please show the details of your work. No details = no credit even if the answer is correct!
a. 00011001
b. 1011
c. 111
4. [15p] Convert the following numbers from hexadecimal to decimal. To obtain credit for the answer please show the details of your work. No details = no credit even if the answer is correct!
a. DCA
b. 000111
c. 1001
5. [10p] Explain in detail the steps required for the establishment of an HTTPS connection as described in class. Support your explanation with an original diagram.
6. [20p] Write a detailed explanation of the Man-in-The- Middle attack. Your explanation must contain:
a) All the steps of the man-in-the-middle attack
b) An original diagram supporting the steps described at point a)